Abstract

Urgency of the research. Today, the Internet of Things (IoT) is firmly entrenched in the lives of billions of people around the world. IoT is used in many areas of human activity - industry, everyday life, medicine, education, urban management and others. However, the increase in the number of connected devices leads to an increase in safety risks - from causing physical harm to humans with these devices to damage to complex technological equipment. That is why the issues of ensuring the protection of IoT systems are relevant. Target setting. Comprehensive protection of IoT systems is possible only with reliable network, software and technical protection of devices, equipment and communications of which these systems consist. Given that the above objects and methods of their protection can be combined into a separate secure system of a smart home, its development is an important theoretical and practical task of cybersecurity. Actual scientific researches and issues analysis. Today, there are many publications that analyze IoT security issues and suggest ways to solve them, but there is no work that would develop a separate model of IoT protection on the example of a smart home. Uninvestigated parts of general matters defining. Analyzing the multilevel architecture of IoT systems and features of cloud platforms of the Internet of Things, highlighting potentially vulnerable components of these complex solutions (access control system to IoT device and cloud platform; clouds, mobile applications and web interfaces of devices; software updates; device memory ; local data warehouses; hardware and software interfaces of devices; network services of devices; ecosystem of communications, including network traffic) it can be argued that building a secure system of a smart home using IoT will increase the level of security of these systems. . The research objective of this article is to build a secure system using IoT on the example of a smart home. The statement of basic materials. The basic concepts of IoT are defined, the main spheres of IoT use are investigated, the secure system of smart house with use of IoT in which the basic ways of protection of the information which is expedient to implement in networks of smart house - VPN, firewall, ACL and passwords for reliable protection is developed. The main IoT vulnerabilities and ways to eliminate them are analyzed. Different architectures of IoT systems are considered. An algorithm for setting up a secure smart home system using IoT is proposed Conclusions. The work developed a secure system using the Internet of Things on the example of a smart home. The advantages and disadvantages of using the Internet of Things are identified. It has been studied that the popularity of the Internet of Things is growing every second, so it is necessary to pay more attention to their protection. The main vulnerabilities of IoT can be considered the lack of standardization, traffic encryption, default passwords. The scheme of a secure system of a smart home using the Internet of Things built in Cisco Packet Tracer and a step-by-step algorithm for debugging its protection system using the ASA5505 firewall to filter incoming traffic were proposed. Strong passwords have been created for IoT device accounts. WPA2 / 3-PSK wireless protocols using the AES algorithm ensure the security of wireless data transmission. The home controller has a unique SSID. The created system can be implemented and safely used in homes and offices.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.